Friday, April 28, 2017
Home / Security / Adware companies purchasing Chrome Add-ons

Adware companies purchasing Chrome Add-ons

Adware and malware programmers and botnet owners are looking for new ways to mass spread and get exposure to their money making methods.   A new method they have been trying out requires a popular extension that already comes complete with a large, trusting user base, there is money to be made, as the developer of extension “Add to Feedly,” Amit Agarwal, discovered. As reported by Omg Chrome, the programmer, whose product has over 30,000 users, was contacted by someone who wished to buy the add-on.

Amit revealed that the extension, which required at most an hour or so to develop, was well worth 4-figures to the person. That sort of figure would tempt most of us, after selling the ownership of the add-on, an update incorporated a different “feature” which included advertising.

“I transferred the ownership of the extension to a particular Google Account,” Amit stated. “A month later, the new owners of the Feedly extension pushed an update to the Chrome store. No, the update didn’t bring any new features to the table, nor contained any bug fixes. Instead, they incorporated advertising into the extension.”

Users that were experiencing these ads and spam started complaining on the Google Web Store, where the original developer also commented.

google-chrome-superfish

Another extension developer stated he has also been contacted by a number of malware companies some even offering as much as six figures per month.  Google and its users need to keep an eye out for this new method of advertising spam that has proved to be very effective and is likely other adware companies will copy.

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

Amazon hacked – hacker leaks 80,000 login credentials

A hacker going by the name 0x2Taylor has said to have breached the servers of …